Skip to main content
Erschienen in: Journal of Medical Systems 5/2014

01.05.2014 | Education & Training

Chaos Based Encryption System for Encrypting Electroencephalogram Signals

verfasst von: Chin-Feng Lin, Shun-Han Shih, Jin-De Zhu

Erschienen in: Journal of Medical Systems | Ausgabe 5/2014

Einloggen, um Zugang zu erhalten

Abstract

In the paper, we use the Microsoft Visual Studio Development Kit and C# programming language to implement a chaos-based electroencephalogram (EEG) encryption system involving three encryption levels. A chaos logic map, initial value, and bifurcation parameter for the map were used to generate Level I chaos-based EEG encryption bit streams. Two encryption-level parameters were added to these elements to generate Level II chaos-based EEG encryption bit streams. An additional chaotic map and chaotic address index assignment process was used to implement the Level III chaos-based EEG encryption system. Eight 16-channel EEG Vue signals were tested using the encryption system. The encryption was the most rapid and robust in the Level III system. The test yielded superior encryption results, and when the correct deciphering parameter was applied, the EEG signals were completely recovered. However, an input parameter error (e.g., a 0.00001 % initial point error) causes chaotic encryption bit streams, preventing the recovery of 16-channel EEG Vue signals.
Literatur
1.
Zurück zum Zitat Hao, X., Wang, J., Yang, Q., et al., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37:9919, 2013.CrossRef Hao, X., Wang, J., Yang, Q., et al., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37:9919, 2013.CrossRef
2.
Zurück zum Zitat Yau, W. C., and Phan, R. C. W., Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med. Syst 37:9993, 2013.CrossRef Yau, W. C., and Phan, R. C. W., Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med. Syst 37:9993, 2013.CrossRef
3.
Zurück zum Zitat Jiang, Q., Ma, J., Lu, X., et al., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med. Syst 38:12, 2014.CrossRef Jiang, Q., Ma, J., Lu, X., et al., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med. Syst 38:12, 2014.CrossRef
4.
Zurück zum Zitat Lee, T. F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med. Syst 37:9985, 2013.CrossRef Lee, T. F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med. Syst 37:9985, 2013.CrossRef
5.
Zurück zum Zitat Lee, C. C., Hsu, C. W., Lai, Y. M., et al., An enhanced mobile-healthcare emergency system based on extended chaotic maps. J Med. Syst 37:9973, 2013.CrossRef Lee, C. C., Hsu, C. W., Lai, Y. M., et al., An enhanced mobile-healthcare emergency system based on extended chaotic maps. J Med. Syst 37:9973, 2013.CrossRef
6.
Zurück zum Zitat Brinkmann, B. H., Bower, M. R., Stengel, K. A., et al., Large-scale electrophysiology: Acquisition, compression, encryption, and storage of big data. J. Neurosci. Methods 180:185–192, 2009.CrossRef Brinkmann, B. H., Bower, M. R., Stengel, K. A., et al., Large-scale electrophysiology: Acquisition, compression, encryption, and storage of big data. J. Neurosci. Methods 180:185–192, 2009.CrossRef
7.
Zurück zum Zitat Ahmad, M., Sohail, S. S., Farooq, O., et al., Chaos-based encryption of biomedical EEG signals using random quantization technique. Proc. 4th Int. Conf. Biomed. Eng. Informa 3:1471–1475, 2011. Ahmad, M., Sohail, S. S., Farooq, O., et al., Chaos-based encryption of biomedical EEG signals using random quantization technique. Proc. 4th Int. Conf. Biomed. Eng. Informa 3:1471–1475, 2011.
8.
Zurück zum Zitat Parveen, S., Parashar, S., and Izharuddin, Technique for providing security in medical signals. Proc. Int. Conf. Multimed. Sig. Process Commun. Technol. 68–71, 2011. Parveen, S., Parashar, S., and Izharuddin, Technique for providing security in medical signals. Proc. Int. Conf. Multimed. Sig. Process Commun. Technol. 68–71, 2011.
9.
Zurück zum Zitat Yang, M. Bourbakis, N, and Li, S., Data, image, video encryption. IEEE Potentials 23:28–34, 2004. Yang, M. Bourbakis, N, and Li, S., Data, image, video encryption. IEEE Potentials 23:28–34, 2004.
10.
Zurück zum Zitat Ou, C. M., Design of block ciphers by simple chaotic functions. IEEE Comput. Intell. Mag 3:54–59, 2009.CrossRef Ou, C. M., Design of block ciphers by simple chaotic functions. IEEE Comput. Intell. Mag 3:54–59, 2009.CrossRef
11.
Zurück zum Zitat Kocarev, L., Chaos-based cryptography: A brief overview. IEEE Circ. Syst. Mag 1:6–21, 2001.CrossRef Kocarev, L., Chaos-based cryptography: A brief overview. IEEE Circ. Syst. Mag 1:6–21, 2001.CrossRef
12.
Zurück zum Zitat Ford, J., What is chaos, that we should be mindful of it? In: Paul, D. (Ed.), The New Physics. Cambridge University Press, Cambridge, pp. 348–372, 1992. Ford, J., What is chaos, that we should be mindful of it? In: Paul, D. (Ed.), The New Physics. Cambridge University Press, Cambridge, pp. 348–372, 1992.
13.
Zurück zum Zitat Kotulski, Z., and Szczepanski, J., Discrete chaotic cryptography. Ann. Phys. 6:381–394, 1997.CrossRefMATH Kotulski, Z., and Szczepanski, J., Discrete chaotic cryptography. Ann. Phys. 6:381–394, 1997.CrossRefMATH
15.
16.
Zurück zum Zitat Marco, G., Kristina, K., and Wolfgang, S., Discrete-time chaotic encryption systems–Part I: Statistical design approach. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:963–970, 1997.CrossRef Marco, G., Kristina, K., and Wolfgang, S., Discrete-time chaotic encryption systems–Part I: Statistical design approach. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:963–970, 1997.CrossRef
17.
Zurück zum Zitat Frank, D., and Kristina, W. S., Discrete-time chaotic encryption systems–Part III: Cryptographical analysis. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 45:983–988, 1998.CrossRef Frank, D., and Kristina, W. S., Discrete-time chaotic encryption systems–Part III: Cryptographical analysis. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 45:983–988, 1998.CrossRef
18.
Zurück zum Zitat Yang, T., Wu, W., and Chua, L. O., Cryptography based on chaotic systems. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:469–472, 1997.CrossRefMATH Yang, T., Wu, W., and Chua, L. O., Cryptography based on chaotic systems. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:469–472, 1997.CrossRefMATH
19.
Zurück zum Zitat Zhou, H., and Ling, X. T., Problems with the chaotic inverse system encryption approach. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:268–271, 1997.CrossRef Zhou, H., and Ling, X. T., Problems with the chaotic inverse system encryption approach. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:268–271, 1997.CrossRef
20.
Zurück zum Zitat Murali, K., Yu, H., Varadan, V., et al., Secure communication using a chaos based signal encryptionscheme. IEEE Trans. Comsumer Electron 47:709–714, 2001.CrossRef Murali, K., Yu, H., Varadan, V., et al., Secure communication using a chaos based signal encryptionscheme. IEEE Trans. Comsumer Electron 47:709–714, 2001.CrossRef
21.
Zurück zum Zitat Jakimoski, G., and Kocarev, L., Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 48:163–169, 2001.CrossRefMATHMathSciNet Jakimoski, G., and Kocarev, L., Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 48:163–169, 2001.CrossRefMATHMathSciNet
23.
Zurück zum Zitat Masuda, N., and Aihara, K., Cryptosystems with discretized chaotic maps. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 49:28–40, 2002.CrossRefMathSciNet Masuda, N., and Aihara, K., Cryptosystems with discretized chaotic maps. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 49:28–40, 2002.CrossRefMathSciNet
25.
Zurück zum Zitat Pareek, N. K., Patidar, V., and Sud, K. K., Discrete chaotic cryptography using external key. Phys. Lett. A 309:75–82, 2003.CrossRefMATHMathSciNet Pareek, N. K., Patidar, V., and Sud, K. K., Discrete chaotic cryptography using external key. Phys. Lett. A 309:75–82, 2003.CrossRefMATHMathSciNet
26.
Zurück zum Zitat Liao, X., Pen, J., and Chen, G., A digital secure image communication scheme based on the chaotic Chebyshev map. Int. J. Commun. Syst 17:437–445, 2004.CrossRef Liao, X., Pen, J., and Chen, G., A digital secure image communication scheme based on the chaotic Chebyshev map. Int. J. Commun. Syst 17:437–445, 2004.CrossRef
27.
Zurück zum Zitat Yen, J. C., and Guo, J. I., Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation. IEE Proc. Vis. Image Signal Proc 147:167–175, 2000.CrossRef Yen, J. C., and Guo, J. I., Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation. IEE Proc. Vis. Image Signal Proc 147:167–175, 2000.CrossRef
28.
Zurück zum Zitat Masuda, N., Jakimoski, G., Aihara, A., et al., Chaotic block ciphers: From theory to practical algorithms. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 53:1341–1352, 2006.CrossRefMathSciNet Masuda, N., Jakimoski, G., Aihara, A., et al., Chaotic block ciphers: From theory to practical algorithms. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 53:1341–1352, 2006.CrossRefMathSciNet
29.
Zurück zum Zitat Lin, C. F., Chang, W. T., and Li, C. Y., A chaos-based visual encryption mechanism in JPEG2000 medical images. J. Med. Biol. Eng. 27:144–149, 2007. Lin, C. F., Chang, W. T., and Li, C. Y., A chaos-based visual encryption mechanism in JPEG2000 medical images. J. Med. Biol. Eng. 27:144–149, 2007.
30.
Zurück zum Zitat Lin, C. F., Chung, C. H., Chen, Z. L., et al., A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. WSEAS Trans. Syst 2:49–55, 2008.MathSciNet Lin, C. F., Chung, C. H., Chen, Z. L., et al., A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. WSEAS Trans. Syst 2:49–55, 2008.MathSciNet
31.
Zurück zum Zitat Lin, C. F., Mobile telemedicine–A survey study. J Med. Syst 36:511–520, 2012.CrossRef Lin, C. F., Mobile telemedicine–A survey study. J Med. Syst 36:511–520, 2012.CrossRef
32.
Zurück zum Zitat Lin, C. F., Chung, C. H., and Lin, J. H., A chaos-based visual encryption mechanism for clinic EEG signals. Med. Biol. Eng. Comput 47:757–762, 2009.CrossRef Lin, C. F., Chung, C. H., and Lin, J. H., A chaos-based visual encryption mechanism for clinic EEG signals. Med. Biol. Eng. Comput 47:757–762, 2009.CrossRef
33.
Zurück zum Zitat Lin, C. F., and Wang, B. S. H., A 2D chaos-based visual encryption scheme for clinical EEG signals. J. Mar. Sci. Technol. Taiwan 19:666–672, 2011. Lin, C. F., and Wang, B. S. H., A 2D chaos-based visual encryption scheme for clinical EEG signals. J. Mar. Sci. Technol. Taiwan 19:666–672, 2011.
34.
Zurück zum Zitat Lin, C. F., Chaos-based 2D visual encryption mechanism for ECG medical signals. In: Thomas, S. C. (Ed.), Horizons in Computer Science Research, vol. 4. Nova, USA, pp. 205–217, 2012. Lin, C. F., Chaos-based 2D visual encryption mechanism for ECG medical signals. In: Thomas, S. C. (Ed.), Horizons in Computer Science Research, vol. 4. Nova, USA, pp. 205–217, 2012.
35.
Zurück zum Zitat Lin, C.F., Shih, S.H., and Zhu, J.D., Implementation of an offline chaos-based EEG encryption software. Proc. IEEE 14th Int. Conf. Adv. Commun. Tech. 430–433, 2012. Lin, C.F., Shih, S.H., and Zhu, J.D., Implementation of an offline chaos-based EEG encryption software. Proc. IEEE 14th Int. Conf. Adv. Commun. Tech. 430–433, 2012.
36.
Zurück zum Zitat Lin, C.F., Shih, S.H., Zhu, J.D., et al., C# based EEG encryption system using chaos algorithm. Proc. 1st Int. Conf. Compl. Syst. Chaos (COSC’13). 59–62, 2013. Lin, C.F., Shih, S.H., Zhu, J.D., et al., C# based EEG encryption system using chaos algorithm. Proc. 1st Int. Conf. Compl. Syst. Chaos (COSC’13). 59–62, 2013.
Metadaten
Titel
Chaos Based Encryption System for Encrypting Electroencephalogram Signals
verfasst von
Chin-Feng Lin
Shun-Han Shih
Jin-De Zhu
Publikationsdatum
01.05.2014
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 5/2014
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0049-6

Weitere Artikel der Ausgabe 5/2014

Journal of Medical Systems 5/2014 Zur Ausgabe